WO2023108871A1 - 一种v2x协议栈的通讯方法 - Google Patents

一种v2x协议栈的通讯方法 Download PDF

Info

Publication number
WO2023108871A1
WO2023108871A1 PCT/CN2022/075896 CN2022075896W WO2023108871A1 WO 2023108871 A1 WO2023108871 A1 WO 2023108871A1 CN 2022075896 W CN2022075896 W CN 2022075896W WO 2023108871 A1 WO2023108871 A1 WO 2023108871A1
Authority
WO
WIPO (PCT)
Prior art keywords
layer
data
protocol stack
message
security
Prior art date
Application number
PCT/CN2022/075896
Other languages
English (en)
French (fr)
Inventor
宋菲
董文娟
刘明凤
杨姜坤
Original Assignee
高新兴智联科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 高新兴智联科技有限公司 filed Critical 高新兴智联科技有限公司
Publication of WO2023108871A1 publication Critical patent/WO2023108871A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]

Definitions

  • the present invention relates to the technical field of wireless communication protocols, in particular to a communication method of a V2X protocol stack.
  • the Internet of Vehicles is the latest development direction of the intelligent transportation system. It adopts advanced wireless communication and new-generation Internet technologies to fully implement vehicle-to-vehicle (V2V), vehicle-to-road (V2I), vehicle-to-network (V2N), and vehicle-to-vehicle People (V2P) and other dynamic real-time information interaction, and based on the collection and fusion of full-time dynamic traffic information, carry out vehicle active safety control and road collaborative management, and fully realize the effective coordination of people, vehicles and roads.
  • V2V vehicle-to-vehicle
  • V2I vehicle-to-road
  • V2N vehicle-to-network
  • V2P vehicle-to-vehicle People
  • V2V Vehicle to Everything
  • V2X Vehicle to Everything
  • the V2X protocol stack uses the DSMP protocol for analysis.
  • the network layer consists of two parts, the data sublayer and the management sublayer; the management sublayer mainly completes system configuration and maintenance, and provides functions such as management interfaces for all data sublayer entities.
  • the data sublayer mainly includes the Adaptation Layer, IP and UDP/TCP, and the cooperative intelligent transportation system DSMP.
  • the V2X protocol stack uses the DSMP protocol for analysis.
  • the data sublayer uses the good interface provided by the management sublayer to transmit the data flow between the application layers.
  • the application layer needs to analyze the five major message sets of BSM, SPAT, MAP, RSI, and RSM to realize relevant scene algorithms.
  • the application number is 202010310297.7
  • the patent publication number is CN 111615078 discloses a communication method and device of the C-V2X protocol stack, which solves the problem of data insecurity, poor portability, inflexible interface, and application support introduced in the prior art. Poor problem, but there are still the following problems: when a variety of different messages need to be received, there will be a risk that the network layer will filter out useful data; at the same time, the provided system selection is not flexible, inconvenient to call, and takes up more resources .
  • the purpose of the present invention is to provide a communication method of the V2X protocol stack.
  • the main functions are modularized and layered to simplify the design process and reduce the Function superposition, enhance system stability.
  • the present invention provides the following technical solutions:
  • a communication method of a V2X protocol stack including
  • the V2X protocol stack receives the original data through the application layer, calls and transfers layer by layer, and generates an air interface broadcast message;
  • the V2X protocol stack receives air interface data and processes it layer by layer and then sends it back to the application layer, including
  • Step S2-2 judging whether the network layer management sublayer is enabled according to the configuration information, and when the network management sublayer is enabled, judging whether it has been added to the management sublayer according to the network layer header information;
  • Step S2-3 When the management sublayer is added or the network layer management sublayer is not enabled, it is judged whether to use the security layer, and the data without the security layer is unpacked by the network layer and uploaded to the message sublayer after the network layer message header is removed; enable Data in the security layer is processed and uploaded to the application layer.
  • the V2X protocol stack receives air interface data and sends it back to the application layer after being processed by each layer, and also includes
  • Step S2-0 The access layer instructs the interface to receive the air interface broadcast message. If it succeeds, it will report the data. If it fails, it will exit the protocol stack.
  • the adaptation layer instructs the interface to receive the reported data. If the reception is successful, the adaptation layer will unpack and remove the adaptation Layer message header information, if it fails, it will exit the protocol stack;
  • Step S2-1 The data sublayer instructs the interface to receive the data reported by the adaptation layer. If the reception is successful, the network layer unpacks, parses the network layer message header information and extracts key fields, and exits the protocol stack if it fails.
  • the network management sublayer is used to judge whether it is the message data of interest subscribed by the user in the previous period according to the header information of the network layer and the extracted key fields, and discard the data if not.
  • uploading the data of enabling the security layer to the application layer after processing includes:
  • Call the security layer instruction interface receive the data filtered by the management sublayer, perform security data verification or secure decryption to obtain plaintext data and report it to the message sublayer, and exit the protocol stack if the verification or decryption fails;
  • the message sublayer instructs the interface to receive the above-mentioned plaintext data, and if the reception is successful, it will perform ASN1C decoding processing, obtain structured data information and upload it to the user application, and exit the protocol stack if it fails;
  • the user application parses the structured data reported by the message sublayer, extracts key fields for business processing, and exits the protocol stack if it fails.
  • the V2X protocol stack receives the original data through the application layer, calls and transfers layer by layer, and generates an air interface broadcast message including
  • Step S1-1 The original data is integrated at the application layer
  • Step S1-2 Determine whether to enable the security layer according to the configuration options. When the security layer is enabled, it is judged whether to use security signature or encryption. After confirming the use, perform security data signature or encryption to generate security data; Flow into the network layer for network layer encapsulation;
  • Step S1-3 The security data invokes the data sublayer and the adaptation layer to perform network layer encapsulation.
  • Step S1-4 The data encapsulated by the network layer selects a V2X communication module at the access layer according to the configuration information, and the access layer services the request, and the communication module performs data encapsulation and conversion, and broadcasts a V2X message through the air interface.
  • step S1-1 includes
  • Step S1-10 The original data of the data source enters the application layer of the protocol stack, processes the original data through the user application and calls the message service request of the message sub-layer;
  • Step S1-11 The message sublayer service request successfully encodes the data.
  • the V2X communication module includes a cellular communication interface and a direct communication interface
  • the direct communication interface includes a Qualcomm module and a Chenxin module.
  • the configuration information is a configuration file with a one-to-one correspondence between keywords and values.
  • the invention realizes parameter transmission and configuration option determination by using configuration files, each layer has independent functions, the upper layer invokes the lower layer function interface, reduces the functional coupling between each layer, the upper layer calls are simple, and the amount of transmitted data parameters is small.
  • the function implementation of each layer is exposed to the upper layer application entity in the form of interface call, which realizes the saving of resources occupied by the protocol stack as a whole. From the user's point of view, the functions of each layer of the protocol stack are clear, the protocol stack is convenient to use, the callable function service interface is simple, the input and output parameters are simple, the system has high stability and reliability
  • this solution separates the network layer from the management sublayer and the data sublayer, and can choose whether to use the management sublayer through the configuration file.
  • the application layer directly calls the network layer to receive data interface function , to achieve the purpose of transparent transmission and reception of application layer messages, without requiring multiple requests for different messages in the early stage.
  • the application layer calls the interface function of the network layer to receive data, it calls the interface function of the lower layer layer by layer from top to bottom, and each layer is independent and the coupling is small.
  • the security layer of this solution has an optional function.
  • the security layer does not need to participate in the encryption and decryption of messages and signature verification.
  • the optional function of this patent can be used in this If you choose not to use the security layer, the application data is directly encapsulated at the network layer, and then sent to the access layer, and then the air interface message is sent to the outside world; the air interface message does not need to be decrypted and verified by the security layer, and it is directly processed after being unpacked by the network layer.
  • Application layer data processing is used in this
  • FIG. 1 is a structural block diagram of the V2X protocol stack proposed by the present invention
  • Fig. 2 is the V2X protocol stack sending and receiving message data flow proposed by the present invention
  • Fig. 3 is a flow chart of transmitting wireless data by the V2X protocol stack of the present invention.
  • Fig. 4 is a flow chart of receiving wireless data by the V2X protocol stack of the present invention.
  • FIG. 5 is a schematic diagram of the V2X protocol stack file directory structure of the present invention.
  • a component when a component is said to be “fixed” to another component, it can be directly on the other component or there can also be an intervening component.
  • a component When a component is said to be “connected” to another component, it may be directly connected to the other component or there may be intervening components at the same time.
  • a component When a component is said to be “set on” another component, it may be set directly on the other component or there may be an intervening component at the same time.
  • the terms “vertical,” “horizontal,” “left,” “right,” and similar expressions are used herein for purposes of illustration only.
  • the present invention is based on the technical requirements related to wireless communication in the Internet of Vehicles industry standard, and simplifies the design process, reduces function superposition, and enhances system stability by modularizing and layering the main functions. Please refer to Figure 1.
  • the V2X protocol stack is divided into four layers from top to bottom: application layer, security layer, network layer, and access layer.
  • the application layer includes user application and message sublayer.
  • the security layer includes a security data processing function module, a security credential management function module, and a security service function module.
  • the network layer is divided into management sublayer and data sublayer.
  • the management sublayer is a dedicated management entity;
  • the data sublayer includes the adaptation layer, UDP/TCP and IP, and dedicated short message protocol function modules.
  • the access layer includes a cellular communication interface module and a direct connection communication interface module.
  • the file directory of the V2X protocol stack of the present invention is divided into a compiling directory and a code directory according to functions.
  • the directory is mainly used to store firmware, scripts and resource files.
  • the code directory is divided into application layer directory, security layer directory, network layer directory, access layer directory, configuration directory, tool directory, third-party library directory, and first-level header file directory according to the functional level.
  • the application layer directory is divided into user application directory and message sublayer directory;
  • the security layer directory is divided into security data processing sublayer directory, security credential management sublayer directory and security service sublayer directory.
  • the network layer directory is divided into the data sublayer directory, the management sublayer directory, and the adaptation layer directory.
  • the access layer directory includes the cellular communication sublayer directory and the direct communication sublayer directory.
  • Each of the above directories is divided into a source code directory and a header file directory, and the source code directory is mainly used to store the implementation data corresponding to the functions of each layer of directory.
  • the configuration directory stores configuration file read and write functions, implementation data (codes) for accessing configuration parameters of each level or function module.
  • the tools directory stores the open source codes of common tools (such as asn1c encoding and decoding tools).
  • the third-party library directory stores the library files of the called third-party function library functions.
  • the first-level header file directory stores header files common to all levels or functional modules.
  • the solution clearly divides the file directory of the V2X protocol stack, classifies and manages header files, source files, and referenced third-party open source codes, making the structure of the entire project clearer, with better scalability and maintainability.
  • the present invention abstracts the main functions of each layer and functional module, and abstracts the main content including initialization, de-initialization, function request, data instruction, acquisition of sending configuration parameters, and acquisition of receiving parameters of each layer.
  • cv2x_XXXGetSendPara is a function function for obtaining configuration parameters for sending data. There are two sources of data for this parameter, one is the configuration file, and the other is the input parameter structure that needs to be passed in when calling the interface.
  • cv2x_XXXGetRecvPara is a function to obtain received data parameters, mainly to configure parameters for the sender carried in the received message, such as power, frequency, and message header parameters.
  • cv2x_XXXInit is a layer or function module initialization function.
  • cv2x_XXXDeinit is a layer or function module deinitialization function.
  • cv2x_XXXRequest is a layer or function module service request function.
  • cv2x_XXXIndication is a layer or function module receiving data processing function.
  • this embodiment provides a communication method of the V2X protocol stack, including the V2X protocol stack receiving the original data through the application layer, and generating an air interface broadcast after calling and passing layer by layer Message; the V2X protocol stack receives air interface data and processes it layer by layer before sending it back to the application layer.
  • the solution transfers the V2X protocol stack layer by layer in a process of sending and receiving air interface data, and calls layer by layer, including
  • Step S1-1 The original data is integrated at the application layer
  • Step S1-2 Determine whether to enable the security layer according to the configuration options. When the security layer is enabled, it is judged whether to use security signature or encryption. After confirming the use, perform security data signature or encryption to generate security data; Flow into the network layer for network layer encapsulation;
  • Step S1-3 The security data invokes the data sublayer and the adaptation layer to perform network layer encapsulation.
  • Step S1-4 The data encapsulated by the network layer selects a V2X communication module at the access layer according to the configuration information, and the access layer services the request, and the communication module performs data encapsulation and conversion, and broadcasts a V2X message through the air interface.
  • V2X protocol stack data sources are abstracted into three types: configuration files, edge computing units or cooperation files.
  • Step S1-1 The original data is integrated at the application layer, including
  • Step S1-10 The original data of the data source enters the application layer of the V2X protocol stack, reads the original data through the user application, and calls the message service request of the message sublayer after reading the data information;
  • Step S1-11 The message sublayer service request successfully encodes the data.
  • the user application After the user application receives the data information read from the upper-layer edge computing unit MEC or cooperates with the file, it performs inspection and integration processing, generates standard application messages according to the interface protocol, and then calls the message service request to the message sub-layer. After calling the message service request successfully, first fill the data information into the standardized message data format, and perform ASN1C encoding. If it fails, it will automatically jump to the end of this program and exit the protocol stack.
  • the security data calls the network layer data sublayer request for network layer encapsulation; when the configuration option is not selected to use the security layer, the application layer data directly flows into the network layer for network layer encapsulation.
  • the security layer of this solution has optional functions. In practical applications, especially in some interface test comparison experiments, the security layer does not need to participate in the encryption and decryption of messages and signature verification.
  • the optional functions of this patent can be used in this case , choose not to use the security layer, the application data is directly encapsulated at the network layer, and then sent to the access layer, and then the air interface message is sent to the outside world; the air interface message does not need to be decrypted and verified by the security layer, and it is directly processed by the application layer after being unpacked by the network layer. data processing.
  • the security layer of this solution is divided into a security data processing function module, a security credential management function module, and a security service function module:
  • the secure data processing function module is responsible for digitally signing or encrypting application messages to be sent, and performing digital signature verification or data decryption for received application messages.
  • the security credential management function module is responsible for interacting with the security credential management entity to obtain relevant security credentials or data such as public key certificates and certificate revocation lists.
  • the security service interface function module is responsible for providing storage of security credentials and security data and cryptographic operation services, such as storage of public key certificates and certificate revocation lists, generation and storage of secret keys, signature, signature verification, encryption, decryption, and hash operations, etc. cryptographic operations. And provide a security service application interface to the security data processing function module and the security credential management function module.
  • the data flow reaches the adaptation layer for adaptation layer encapsulation, and then selects the communication module of the adaptation layer according to the configuration information, invokes the service request of the access layer, and then generates an air interface broadcast message, and broadcasts the message.
  • the V2X communication module includes a cellular communication interface and a direct communication interface
  • the direct communication interface includes a Qualcomm module and a Chenxin module.
  • the abstraction of the access layer divided in this way adapts to different types of V2X communication modules. Through configuration file selection, it can support the adaptation of V2X communication modules from different manufacturers.
  • configuration information of this solution is a configuration file with one-to-one correspondence between keywords and values, which can also be understood as the function switch of each configurable function, and the corresponding function is selected to be turned on or off according to the actual application scenario.
  • the V2X protocol stack receives the air interface data and processes it layer by layer and sends it back to the application layer, including
  • Step S2-0 The access layer instructs the interface to receive the air interface broadcast message. If it succeeds, it will report the data. If it fails, it will exit the V2X protocol stack.
  • the adaptation layer instructs the interface to receive the reported data. Match layer message header information, if it fails, it will exit the protocol stack;
  • Step S2-1 The data sublayer instructs the interface to receive the data reported by the adaptation layer. If the reception is successful, the network layer unpacks, parses the network layer message header information and extracts key fields, and exits the V2X protocol stack if it fails.
  • the air interface data flow is first received and processed by the access layer of the V2X protocol stack. If it fails, an error code is returned and the program ends, exiting the V2X protocol stack.
  • the adaptation layer receives the data reported by the access layer, unpacks the adaptation layer, removes the adaptation layer header information from the unpacked adaptation layer data, and removes the adaptation layer message header encapsulated by the adaptation layer. If it fails, it returns an error code and jumps to the end of the program, exiting the V2X protocol stack.
  • the returned data needs to check whether it is the network data message requested in the previous period in the MIB list of the network layer, and adopt the callback method to receive and process the data.
  • the application layer directly calls the network layer receiving data interface function cyclically to achieve the purpose of transparently transmitting and receiving application layer messages without requiring multiple requests for different messages in the early stage.
  • the V2X protocol stack receives air interface data and sends it back to the application layer after being processed by each layer, and also includes
  • Step S2-2 judging whether the network layer management sublayer is enabled according to the configuration information, and when the network management sublayer is enabled, judging whether it has been added to the management sublayer according to the network layer header information;
  • Step S2-3 When the management sublayer is added or the network layer management sublayer is not enabled, it is judged whether to use the security layer, and the data without the security layer is unpacked by the network layer and uploaded to the message sublayer after the network layer message header is removed; enable Data in the security layer is processed and uploaded to the application layer.
  • the network layer separates the management sublayer and the data sublayer, and whether to use the management sublayer can be selected through the configuration file.
  • the application layer data is directly encapsulated in the network, and the returned data is directly transmitted to the network. Unpacking does not filter messages at the pipe layer, and functions as a transparent transmission of application messages.
  • the application layer calls the interface function of the network layer to receive data, it calls the interface function of the lower layer layer by layer from top to bottom, and each layer is independent and the coupling is small.
  • the application layer can also directly call the interface functions sent and received by the access layer, and the data sending and receiving functions of the lower layer are not affected by the upper layer, which realizes the flexibility and convenience of the secondary development interface.
  • the management sublayer determines whether to enable the service function of the management sublayer. If enabled, the management sublayer will judge whether it is an interesting message subscribed by the user in the early stage according to the key field extracted by the network layer. If it is not the attention added by the user in the early stage If there is no message, the message discarding process is performed in this link. Only messages of interest to the user are passed upwards.
  • the network layer management sublayer is not enabled, the data stream processed by the adaptation layer will be directly unpacked by the network layer, the network layer message header will be removed, and then uploaded to the message sublayer.
  • the security data processing option is enabled according to the configuration information, that is, whether the security layer is enabled.
  • Report data for digital signature verification or security decryption processing If it fails, return an error code and jump to the end of the program to exit the V2X protocol stack.
  • the plaintext data is obtained after digital signature verification or security data decryption, and the plaintext data is passed upward to the message sublayer of the application layer.
  • the security layer When the security layer is not used, the network layer data flows directly into the message sublayer of the application layer. In this way, by selecting whether to use the security layer through the configuration file, the security layer is independent and configurable, and the flexibility of the system is improved.
  • the message sublayer instructs the interface to receive the above plaintext data. If the reception is successful, the ASN1C data format will be decoded to obtain structured data information. The decoded data will be passed up to the user application. The user application will report the structure of the message sublayer according to the actual application logic. Analyze the optimized data, extract key fields according to user needs for business processing, return an error code and jump to the end of the program if it fails, and exit the V2X protocol stack.
  • each layer of the present invention uses configuration files to extract fixed parameters during software operation, avoiding cross-layer transmission of device configuration data and increasing the burden of software operation.
  • the original data of the data source enters the application layer of the V2X protocol stack, and the user application checks and integrates the original data, generates a standard application message according to the interface protocol, and then requests the message encoding from the message sublayer, and then determines whether to use it according to the configuration options.
  • Secure signature or encryption perform secure data signature or encryption, and generate secure data
  • secure data calls the network layer data sublayer request, and performs network layer encapsulation
  • the application layer data directly flows into the network layer for network layer Encapsulation
  • the data stream reaches the adaptation layer for adaptation layer encapsulation; then selects the communication module of the adaptation layer according to the configuration data, invokes the service request of the access layer, and then generates an air interface broadcast message and broadcasts the message.
  • the air interface data stream is first received and processed by the access layer of the V2X protocol stack, and then unpacked by the adaptation layer.
  • the unpacked adaptation layer data removes the adaptation layer header information.
  • Call the network layer data sublayer instruction interface to extract the network layer header information; judge whether the network layer management sublayer function is enabled according to the configuration information.
  • the data stream processed by the adaptation layer will be directly After the network layer unpacks, removes the network layer message header, and then uploads to the message layer; if the management sublayer in the network layer is enabled, it will judge whether the message is the interesting data added by the previous user according to the network layer header information, if not, then Discard the data; if it is a message that the user is interested in, judge whether the security data processing option (security layer) is enabled according to the configuration, and if it is enabled, call the security layer to instruct the interface to perform security data verification or decryption, and the verified or decoded
  • the plaintext data is decoded by the message layer instructing the interface to decode the message layer data; when the security layer is not used, the network layer data flows directly into the message sublayer of the application layer for message decoding; finally, the data fields that the user is interested in are extracted and reported to the upper edge computing unit or Other user management platforms.
  • the invention realizes parameter transmission and configuration option determination by using configuration files, each layer has independent functions, the upper layer invokes the lower layer function interface, reduces the functional coupling between each layer, the upper layer calls are simple, and the amount of transmitted data parameters is small.
  • the function realization of each layer is exposed to the upper application entity in the form of interface call, which realizes the saving of resources occupied by the V2X protocol stack as a whole.
  • the functions of each layer of the V2X protocol stack are clear, easy to use, the callable function service interface is simple, the input and output parameters are simple in structure, and the system has high stability and reliability. In this way, the solution is flexible and convenient, and the secondary development interface is flexible and powerful.

Abstract

本发明涉及无线通信协议技术领域,公开了一种V2X协议栈的通讯方法,包括V2X协议栈将原始数据经应用层接收,逐层调用传递后生成空口广播消息,以及V2X协议栈接收空口数据并逐层处理后传回至应用层。本发明基于车联网行业标准中无线通信相关技术要求,通过模块化、层级化各主要功能,简化设计流程,减少功能叠加,增强系统稳定性,同时各层功能明确,各层耦合性小,上层调用下层提供的功能接口,下层不会调用上层功能接口,协议栈各层可根据需要单独对外提供本层的功能服务,从用户角度,协议栈使用便捷,可调用的功能服务接口简单,入参和出参结构简单,系统稳定性高,可靠性高。

Description

一种V2X协议栈的通讯方法 技术领域
本发明涉及无线通信协议技术领域,具体涉及一种V2X协议栈的通讯方法。
背景技术
车联网是智慧交通系统发展的最新方向,是采用先进的无线通信和新一代互联网等技术,全方位实施车-车(V2V)、车-路(V2I)、车-网(V2N)、车-人(V2P)等动态实时信息交互,并在全时空动态交通信息采集与融合的基础上开展车辆主动安全控制和道路协同管理,充分实现人车路的有效协同。
上述四种车辆通信的情况:V2V、V2I、V2N、V2P,可统称为V2X,即Vehicle to Everything,意为车与外界信息的交换。
目前行业协会等标准组织已针对车辆网无线通信在技术上提出了一系列的标准,将系统架构及基本功能做了相关说明,将车联网无线通信系统按照功能划分成若干层级,自上而下分为应用层、安全层、网络层、接入层。
目前V2X协议栈用到的是DSMP协议去解析。网络层由数据子层和管理子层两部分构成;管理子层主要完成系统配置及维护,为所有的数据子层实体提供管理接口等功能。数据子层主要包括适配层(Adaptation Layer)、IP和UDP/TCP以及合作式智能运输系统DSMP。目前V2X协议栈用到的是DSMP协议去解析。数据子层利用管理子层提供好的接口传输应用层间的数据流。应用层自己要解析出来得出的BSM,SPAT,MAP,RSI,RSM五大消息集,实现相关场景算法。
例如申请号为202010310297.7,公布号为CN 111615078的专利中,公开了一种C-V2X协议栈的通信方法及装置,解决现有技术中引入数据不安全、移植性差、接口不灵活、应用程序支持差的问题,但是目前还存在如下问题:当需要接收多种不同消息时,会存在网络层过滤掉有用数据的风险;同时,提供的 系统选配不灵活,调用不方便,且占用资源较多。
发明内容
针对现有技术存在的不足,本发明的目的在于提供一种V2X协议栈的通讯方法,基于车联网行业标准中无线通信相关技术要求,通过模块化、层级化各主要功能,简化设计流程,减少功能叠加,增强系统稳定性。
为了实现上述目的,本发明提供如下技术方案:
一种V2X协议栈的通讯方法,包括
V2X协议栈将原始数据经应用层接收,逐层调用传递后生成空口广播消息;
V2X协议栈接收空口数据并逐层处理后传回至应用层,包括
步骤S2-2:根据配置信息判断是否启用了网络层管理子层,启用网络管理子层时,根据网络层头部信息判断是否已添加到管理子层;
步骤S2-3:添加管理子层或未启用网络层管理子层时,判断是否使用安全层,未启用安全层的数据经过网络层解包、去除网络层消息头后上传至消息子层;启用安全层的数据经过处理后上传至应用层。
在本发明中,进一步的,所述V2X协议栈接收空口数据并经过各层处理后传回应用层,还包括
步骤S2-0:接入层指示接口接收空口广播消息,成功则进行数据上报,失败则退出协议栈,适配层指示接口接收上报的数据,接收成功则进行适配层解包并去掉适配层消息头信息,失败则退出协议栈;
步骤S2-1:数据子层指示接口接收适配层上报数据,接收成功则进行网络层解包,解析网络层消息头信息并提取关键字段,失败则退出协议栈。
在本发明中,进一步的,网络管理子层用于根据网络层头部信息以及提取的关键字段判断是否为用户前期订阅的感兴趣的消息数据,不是则丢弃该数据。
在本发明中,进一步的,所述启用安全层的数据经过处理后上传至应用层包括:
调用安全层指示接口,接收管理子层筛选后的数据,进行安全数据验签或安全解密得到明文数据并上报至消息子层,验签或解密失败则退出协议栈;
在本发明中,进一步的,所述消息子层指示接口接收上述明文数据,接收成功则进行ASN1C解码处理,获得结构化的数据信息上传至用户应用,失败则退出协议栈;
用户应用对消息子层上报的结构化数据进行解析,提取关键字段进行业务处理,失败则退出协议栈。
在本发明中,进一步的,所述V2X协议栈将原始数据经应用层接收,逐层调用传递后生成空口广播消息包括
步骤S1-1:原始数据在应用层进行整合;
步骤S1-2:根据配置选项确定是否启用安全层,启用安全层则判断是否使用安全签名或加密,确定使用后进行安全数据签名或加密,生成安全数据;未启用安全层时,应用层的数据流入网络层进行网络层封装;
步骤S1-3:安全数据调用数据子层以及适配层,进行网络层封装。
在本发明中,进一步的,所述步骤S1-3后设有
步骤S1-4:经网络层封包的数据在接入层根据配置信息选择V2X通信模组,接入层服务请求,由通信模组进行数据封装转换,经空口对外广播V2X消息。
在本发明中,进一步的,所述步骤S1-1包括
步骤S1-10:数据源的原始数据进入到协议栈的应用层,通过用户应用对原始数据进行处理并调用消息子层的消息服务请求;
步骤S1-11:消息子层服务请求成功对数据进行编码。
在本发明中,优选的,所述V2X通信模组包括蜂窝通讯接口以及直连通讯接口,所述直连通讯接口包括高通模组和辰芯模组。
在本发明中,优选的,所述配置信息为关键字和数值一一对应的配置文件。
与现有技术相比,本发明的有益效果是:
本发明实现了使用配置文件进行参数传递和配置选项的确定,各层功能独立,上层调用下层功能接口,减少各层之间功能耦合性,上层调用简单,传递数据参数量小。各层的功能实现均以接口调用的形式暴露给上层应用实体,整体实现了协议栈占用资源的节约。从用户角度,本协议栈各层功能明确,协议栈使用便捷,可调用的功能服务接口简单,入参和出参结构简单,系统稳定性高,可靠性高
同时,本方案将网络层将管理子层和数据子层分离,并可以通过配置文件选配是否使用管理子层,在不适用该管理子层时,应用层直接循环调用网络层接收数据接口函数,达到应用层消息透传发送和接收的目的,无需前期针对不同消息进行多次请求。应用层调用网络层接收数据的接口函数时,由上至下,逐层调用下层接口函数,各层之间独立、耦合性小。
同时,本方案安全层具备选配功能,在实际应用中,特别是一些接口测试对比试验中,不需要安全层参与消息的加解密和签名验签,本专利的选配功能,可在这种情况下,选择不使用安全层,应用数据直接进行网络层封装,再到接入层,继而对外发送空口消息;空口消息接收也不需安全层解密和验签,经网络层解包后直接进行应用层数据处理。
如此,实现了本方案的应用灵活、便捷,二次开发接口调用灵活,功能强大。
附图说明
附图用来提供对本发明的进一步理解,并且构成说明书的一部分,与本发明的实施例一起用于解释本发明,并不构成对本发明的限制。在附图中:
图1是本发明提出的V2X协议栈结构框图;
图2是本发明提出的V2X协议栈收发消息数据流;
图3是本发明的出的V2X协议栈发送无线数据的发送数据流程图;
图4是本发明的V2X协议栈接收无线数据的接收数据流程图;
图5是本发明的V2X协议栈文件目录结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
需要说明的是,当组件被称为“固定于”另一个组件,它可以直接在另一个组件上或者也可以存在居中的组件。当一个组件被认为是“连接”另一个组件,它可以是直接连接到另一个组件或者可能同时存在居中组件。当一个组件被认为是“设置于”另一个组件,它可以是直接设置在另一个组件上或者可能同时存在居中组件。本文所使用的术语“垂直的”、“水平的”、“左”、“右”以及类似的表述只是为了说明的目的。
除非另有定义,本文所使用的所有的技术和科学术语与属于本发明的技术领域的技术人员通常理解的含义相同。本文中在本发明的说明书中所使用的术语只是为了描述具体的实施例的目的,不是旨在于限制本发明。本文所使用的术语“及/或”包括一个或多个相关的所列项目的任意的和所有的组合。
本发明基于车联网行业标准中无线通信相关技术要求,通过模块化、层级 化各主要功能,简化设计流程,减少功能叠加,增强系统稳定性。请参见图1,根据行业标准技术要求,V2X协议栈自上而下划分为四层:应用层、安全层、网络层、接入层。
其中,应用层包含用户应用、消息子层。
安全层包含安全数据处理功能模块、安全凭证管理功能模块、安全服务功能模块。
网络层分为管理子层、数据子层。其中,管理子层为专用管理实体;数据子层包括适配层、UDP/TCP和IP、专用短消息协议功能模块。
接入层包含蜂窝通信接口模块、直连通信接口模块。
在本发明提供的一实施例中,请参见图5,为了便于对实现上述层级以及功能模块的数据进行管理,本发明的V2X协议栈的文件目录按照功能划分为编译用目录和代码目录,编译目录主要用于存放固件、脚本以及资源文件。代码目录按照功能层级划分为应用层目录、安全层目录、网络层目录、接入层目录、配置目录、工具目录、第三方库目录以及一级头文件目录。
其中,其中应用层目录二次划分为用户应用目录以及消息子层目录;所述安全层目录二次划分为安全数据处理子层目录、安全凭证管理子层目录以及安全服务子层目录,所述网络层目录二次划分为数据子层目录、管理子层目录、适配层目录,接入层目录包括蜂窝通信子层目录、直连通信子层目录。上述每个目录划分为源码目录和头文件目录,其中源码目录主要用于存放与各层目录功能相对应的实现数据。
此外,配置目录存放配置文件读写功能、各层级或功能模块配置参数存取的实现数据(代码)。工具目录存放通用工具(如asn1c编解码工具)开源代码。第三方库目录存放调用的第三方功能库函数的库文件。一级头文件目录存放各 层级或功能模块公用的头文件。
如此,方案将V2X协议栈的文件目录进行清晰的划分,对头文件和源文件,及引用的第三方开源代码进行分类管理,使得整个工程的结构更清晰,扩展性好,维护性好。实现功能进行抽象,规范统一格式,各层层次分明,功能独立,使得整个V2X协议栈结构清晰,便于管理和后期维护。
其次,本发明抽象各个层级和功能模块的主要功能,抽象出主要内容包括各层的初始化、去初始化、功能请求、数据指示、获取发送配置参数、获取接收参数。
例如,统一规划、标准化功能,在函数实现上根据数据收发的数据流向将功能归纳为以下指示接口功能函数:
cv2x_XXXGetSendPara为获取发送数据配置参数功能函数,该参数有两种数据来源,一是配置文件、一是调用接口需传入的入参结构体。
cv2x_XXXGetRecvPara为获取接收数据参数功能函数,主要为接收消息中携带的发送端配置参数,如功率、频点、消息头参数。
cv2x_XXXInit为层级或功能模块初始化函数。
cv2x_XXXDeinit为层级或功能模块去初始化函数。
cv2x_XXXRequest为层级或功能模块服务请求函数。
cv2x_XXXIndication为层级或功能模块接收数据处理函数。
本发明提供的另一实施例中,基于上述协议栈的数据,本实施方式提供一种V2X协议栈的通讯方法,包括V2X协议栈将原始数据经应用层接收,逐层调用传递后生成空口广播消息;V2X协议栈接收空口数据并逐层处理后传回至应用层。
请参见图3,方案将V2X协议栈在一次收发空口数据流程进行了逐层传递, 逐层调用,具体包括
步骤S1-1:原始数据在应用层进行整合;
步骤S1-2:根据配置选项确定是否启用安全层,启用安全层则判断是否使用安全签名或加密,确定使用后进行安全数据签名或加密,生成安全数据;未启用安全层时,应用层的数据流入网络层进行网络层封装;
步骤S1-3:安全数据调用数据子层以及适配层,进行网络层封装。
步骤S1-4:经网络层封包的数据在接入层根据配置信息选择V2X通信模组,接入层服务请求,由通信模组进行数据封装转换,经空口对外广播V2X消息。
在本发明中,进一步的,V2X协议栈数据源抽象为三类:配置文件、边缘计算单元或配合文件。步骤S1-1:原始数据在应用层进行整合,包括
步骤S1-10:数据源的原始数据进入到V2X协议栈的应用层,通过用户应用对原始数据进行读取,读取数据信息后,调用消息子层的消息服务请求;
步骤S1-11:消息子层服务请求成功对数据进行编码。
具体的,用户应用接收到上层边缘计算单元MEC或配合文件读取的数据信息后,进行检验、整合处理,按照接口协议生成标准应用消息,再向消息子层调用消息服务请求。调用消息服务请求成功后首先将数据信息填充到规范的消息数据格式中,进行ASN1C编码,失败则自动跳转至本程序结束,退出协议栈。
之后根据配置信息选项确定是否启用安全层,确定启用后判断是否使用安全签名或加密,也就是说将ASN1C编码后的数据流进行安全数据处理服务请求,确定则进行安全数据签名或加密,生成安全数据,失败则返回错误码跳至程序末尾,退出V2X协议栈。安全数据调用网络层数据子层请求,进行网络层封装;配置选项未选中使用安全层时,应用层数据直接流入网络层进行网络层封装。
本方案安全层具备选配功能,在实际应用中,特别是一些接口测试对比试 验中,不需要安全层参与消息的加解密和签名验签,本专利的选配功能,可在这种情况下,选择不使用安全层,应用数据直接进行网络层封装,再到接入层,继而对外发送空口消息;空口消息接收也不需安全层解密和验签,经网络层解包后直接进行应用层数据处理。
其中,本方案的安全层分为安全数据处理功能模块、安全凭证管理功能模块、安全服务功能模块:
安全数据处理功能模块负责对需要发送的应用消息进行数字签名或加密,对接收到的应用消息进行数字签名验证或数据解密。
安全凭证管理功能模块负责与安全凭证管理实体交互获得相关的公钥证书和证书撤销列表等安全凭证或数据。
安全服务接口功能模块负责提供安全凭证和安全数据的存储和密码运算服务,如公钥证书和证书撤销列表的存储,秘钥的生成和存储,签名、验签、加密、解密和哈希运算等密码运算。并向安全数据处理功能模块和安全凭证管理功能模块模块提供安全服务应用接口。
以此来完成安全签名或加密的工作,实现V2X的通信安全。
接着,数据流到达适配层进行适配层封装,之后根据配置信息进行适配层通信模组选择,调用接入层服务请求,继而生成空口广播消息,广播该消息。
其中,本发明中作为优选,V2X通信模组包括蜂窝通讯接口以及直连通讯接口,直连通讯接口包括高通模组和辰芯模组。如此划分的接入层抽象适配了不同种类的V2X通信模组,通过配置文件选配,可支持适配不同厂家的V2X通信模组。
此外,需要说明的是,本方案配置信息为关键字和数值一一对应的配置文件,也可以理解为各个可配置功能的功能开关,根据实际应用场景选择开或关 相应的功能。
在本发明中,请参见图4,进一步的,V2X协议栈接收空口数据并逐层处理后传回至应用层,包括
步骤S2-0:接入层指示接口接收空口广播消息,成功则进行数据上报,失败则退出V2X协议栈,适配层指示接口接收上报的数据,接收成功则进行适配层解包并去掉适配层消息头信息,失败则退出协议栈;
步骤S2-1:数据子层指示接口接收适配层上报数据,接收成功则进行网络层解包,解析网络层消息头信息并提取关键字段,失败则退出V2X协议栈。
具体的,空口数据流先由V2X协议栈接入层接收处理,失败则返回错误码跳至程序末尾,退出V2X协议栈。适配层接收接入层上报数据,进行适配层解包,解包后的适配层数据去掉适配层头部信息,以去掉适配层封装的适配层消息头。失败则返回错误码跳至程序末尾,退出V2X协议栈。
此外,现有的V2X通讯过程中,回传数据需要在网络层的MIB列表中查找是否为前期请求的网络数据消息,采用回调方式进行数据接收和处理。当需要接收多种不同消息时,需要向网络层进行多个请求,才能避免不被网络层过滤掉有用数据。本专利中,在不使用管理子层时,应用层直接循环调用网络层接收数据接口函数,达到应用层消息透传发送和接收的目的,无需前期针对不同消息进行多次请求。
例如,所述V2X协议栈接收空口数据并经过各层处理后传回应用层,还包括
步骤S2-2:根据配置信息判断是否启用了网络层管理子层,启用网络管理子层时,根据网络层头部信息判断是否已添加到管理子层;
步骤S2-3:添加管理子层或未启用网络层管理子层时,判断是否使用安全 层,未启用安全层的数据经过网络层解包、去除网络层消息头后上传至消息子层;启用安全层的数据经过处理后上传至应用层。
本方案将网络层将管理子层和数据子层分离,并可以通过配置文件选配是否使用管理子层,在不适用该管理子层时,应用层数据直接进行网络封装,回传数据直接网络解包,不进行管子层消息过滤,起到应用消息透传的功能。同时,应用层调用网络层接收数据的接口函数时,由上至下,逐层调用下层接口函数,各层之间独立、耦合性小。此外,应用层也可以直接调用接入层发送和接收的接口函数,下层数据收发功能不受上层影响,实现了二次开发接口的灵活、便捷。
具体的,根据配置信息,确定是否启用管理子层服务功能,若启用,管理子层则根据网络层提取的关键字段判断是否为用户前期订阅的感兴趣的消息,如果不是用户前期添加的关注信息,则在此环节进行消息丢弃处理。只有用户感兴趣的消息才能向上传递。未启用网络层管理子层时,适配层处理后的数据流将直接经网络层解包、去除网络层消息头,再上传至消息子层。
如果是用户感兴趣的消息,则根据配置信息判断是否启用了安全数据处理选项,也就是是否启用安全层,若启用,则调用安全层指示接口,接收管理子层筛选后的数据,对网络层上报数据进行数字签名验证或安全解密处理,失败则返回错误码跳至程序末尾,退出V2X协议栈。经数字验签或安全数据解密后得到明文数据,明文数据向上传递到应用层的消息子层。未使用安全层时,网络层数据直接流入应用层的消息子层。如此,通过配置文件选配是否使用安全层,实现了安全层独立且可配置,提高了系统的灵活性。
消息子层指示接口接收上述明文数据,接收成功则进行ASN1C数据格式解码,获得结构化的数据信息,解码后的数据向上传递到用户应用,用户应用根 据实际应用逻辑,对消息子层上报的结构化数据进行解析,依据用户需求提取关键字段进行业务处理,失败则返回错误码跳至程序末尾,退出V2X协议栈。
最后提取用户感兴趣的数据字段上报给上层边缘计算单元或者是其他用户管理平台。
如此,本发明各层使用配置文件提取软件运行时的固定参数,避免设备配置数据跨层传递,增加软件运行负担。
如图2所示,在本实施方式中,
工作原理及特点:
数据源的原始数据进入到V2X协议栈的应用层,由用户应用对原始数据进行检验、整合处理,按照接口协议生成标准应用消息,再向消息子层请求消息编码,之后根据配置选项确定是否使用安全签名或加密,进行安全数据签名或加密,生成安全数据;安全数据调用网络层数据子层请求,进行网络层封装;配置选项未选中使用安全层时,应用层数据直接流入网络层进行网络层封装;数据流到达适配层进行适配层封装;之后根据配置数据进行适配层通信模组选择,调用接入层服务请求,继而生成空口广播消息,广播该消息。
空口数据流先由V2X协议栈接入层接收处理,后经适配层解包,解包后的适配层数据去掉适配层头部信息。调用网络层数据子层指示接口,提取网络层头部信息;根据配置信息,判断是否启用了网络层管理子层功能,未启用网络层管理子层时,适配层处理后的数据流将直接经网络层解包、去除网络层消息头,再上传至消息层;启用了网络层中管理子层,将根据网络层头部信息判断该消息是否为前期用户添加的感兴趣的数据,不是则丢弃该数据;如果是用户感兴趣的消息,则根据配置判断是否启用了安全数据处理选项(安全层),如果启用则调用安全层指示接口进行安全数据验签或解密,验签或解码后的明文 数据由消息层指示接口进行消息层数据解码;未使用安全层时,网络层数据直接流入应用层的消息子层进行消息解码;最后提取用户感兴趣的数据字段上报给上层边缘计算单元或者是其他用户管理平台。
本发明实现了使用配置文件进行参数传递和配置选项的确定,各层功能独立,上层调用下层功能接口,减少各层之间功能耦合性,上层调用简单,传递数据参数量小。各层的功能实现均以接口调用的形式暴露给上层应用实体,整体实现了V2X协议栈占用资源的节约。
从用户角度,本V2X协议栈各层功能明确,使用便捷,可调用的功能服务接口简单,入参和出参结构简单,系统稳定性高,可靠性高。如此,实现了本方案灵活、便捷,二次开发接口调用灵活,功能强大。
上述说明是针对本发明较佳可行实施例的详细说明,但实施例并非用以限定本发明的专利申请范围,凡本发明所提示的技术精神下所完成的同等变化或修饰变更,均应属于本发明所涵盖专利范围。

Claims (10)

  1. 一种V2X协议栈的通讯方法,其特征在于,包括
    V2X协议栈将原始数据经应用层接收,逐层调用传递后生成空口广播消息;
    V2X协议栈接收空口数据并逐层处理后传回至应用层,包括
    步骤S2-2:根据配置信息判断是否启用了网络层管理子层,启用网络管理子层时,根据网络层头部信息判断是否已添加到管理子层;
    步骤S2-3:添加管理子层或未启用网络层管理子层时,判断是否使用安全层,未启用安全层的数据经过网络层解包、去除网络层消息头后上传至消息子层;启用安全层的数据经过处理后上传至应用层。
  2. 根据权利要求1所述的一种V2X协议栈的通讯方法,其特征在于,所述V2X协议栈接收空口数据并经过各层处理后传回应用层,还包括
    步骤S2-0:接入层指示接口接收空口广播消息,成功则进行数据上报,失败则退出协议栈,适配层指示接口接收上报的数据,接收成功则进行适配层解包并去掉适配层消息头信息,失败则退出协议栈;
    步骤S2-1:数据子层指示接口接收适配层上报数据,接收成功则进行网络层解包,解析网络层消息头信息并提取关键字段,失败则退出协议栈。
  3. 根据权利要求1所述的一种V2X协议栈的通讯方法,其特征在于,所述网络管理子层用于根据网络层头部信息以及提取的关键字段判断是否为用户前期订阅的感兴趣的消息数据,不是则丢弃该数据。
  4. 根据权利要求1所述的一种V2X协议栈的通讯方法,其特征在于,所述启用安全层的数据经过处理后上传至应用层包括:
    调用安全层指示接口,接收管理子层筛选后的数据,进行安全数据验签或安全解密得到明文数据并上报至消息子层,验签或解密失败则退出协议栈。
  5. 根据权利要求4所述的一种V2X协议栈的通讯方法,其特征在于,所 述消息子层指示接口接收上述明文数据,接收成功则进行ASN1C解码处理,获得结构化的数据信息上传至用户应用,失败则退出协议栈;
    用户应用对消息子层上报的结构化数据进行解析,提取关键字段进行业务处理,失败则退出协议栈。
  6. 根据权利要求1所述的一种V2X协议栈的通讯方法,其特征在于,所述V2X协议栈将原始数据经应用层接收,逐层调用传递后生成空口广播消息包括
    步骤S1-1:原始数据在应用层进行整合;
    步骤S1-2:根据配置选项确定是否启用安全层,启用安全层则判断是否使用安全签名或加密,确定使用后进行安全数据签名或加密,生成安全数据;未启用安全层时,应用层的数据流入网络层进行网络层封装;
    步骤S1-3:安全数据调用数据子层以及适配层,进行网络层封装。
  7. 根据权利要求6所述的一种V2X协议栈的通讯方法,其特征在于,所述步骤S1-3后设有
    步骤S1-4:经网络层封包的数据在接入层根据配置信息选择V2X通信模组,接入层服务请求,由通信模组进行数据封装转换,经空口对外广播V2X消息。
  8. 根据权利要求6所述的一种V2X协议栈的通讯方法,其特征在于,所述,所述步骤S1-1包括
    步骤S1-10:数据源的原始数据进入到协议栈的应用层,通过用户应用对原始数据进行处理并调用消息子层的消息服务请求;
    步骤S1-11:消息子层服务请求成功对数据进行编码。
  9. 根据权利要求7所述的一种V2X协议栈的通讯方法,其特征在于,所述V2X通信模组包括蜂窝通讯接口以及直连通讯接口,所述直连通讯接口包括高通 模组和辰芯模组。
  10. 根据权利要求1所述的一种V2X协议栈的通讯系统,其特征在于,所述配置信息为关键字和数值一一对应的配置文件。
PCT/CN2022/075896 2021-12-17 2022-02-10 一种v2x协议栈的通讯方法 WO2023108871A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111546287.4 2021-12-17
CN202111546287.4A CN113938858B (zh) 2021-12-17 2021-12-17 一种v2x协议栈的通讯方法

Publications (1)

Publication Number Publication Date
WO2023108871A1 true WO2023108871A1 (zh) 2023-06-22

Family

ID=79289278

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/075896 WO2023108871A1 (zh) 2021-12-17 2022-02-10 一种v2x协议栈的通讯方法

Country Status (2)

Country Link
CN (1) CN113938858B (zh)
WO (1) WO2023108871A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116599774A (zh) * 2023-07-17 2023-08-15 交通运输部公路科学研究所 一种用于车联网信息安全与数据防护的加密芯片
CN117729544A (zh) * 2024-02-04 2024-03-19 中国电子科技集团公司第三十研究所 移动通信n4接口安全防护装置和方法
CN117729544B (zh) * 2024-02-04 2024-04-30 中国电子科技集团公司第三十研究所 移动通信n4接口安全防护装置和方法

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113938858B (zh) * 2021-12-17 2022-04-12 高新兴智联科技有限公司 一种v2x协议栈的通讯方法
CN114339680B (zh) * 2022-03-07 2022-06-07 高新兴智联科技有限公司 一种v2x系统及安全认证方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107347030A (zh) * 2017-06-29 2017-11-14 重庆邮电大学 一种基于v2x通信的消息管理装置及方法
US20200267518A1 (en) * 2017-11-27 2020-08-20 Intel IP Corporation Multi-access edge computing (mec) based multi-operator support for c-v2x systems
US20210112384A1 (en) * 2016-11-28 2021-04-15 Lg Electronics Inc. Device and method for v2x communication
CN113055198A (zh) * 2019-12-26 2021-06-29 大唐高鸿数据网络技术股份有限公司 一种应用标识集合配置方法、设备、装置及介质
CN113938858A (zh) * 2021-12-17 2022-01-14 高新兴智联科技有限公司 一种v2x协议栈的通讯方法

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100512310C (zh) * 2006-03-28 2009-07-08 华为技术有限公司 一种支持多个协议栈的系统及方法
CN102316504B (zh) * 2010-06-30 2016-01-20 重庆重邮信科通信技术有限公司 一种移动通信系统协议栈模拟器
CN104243172B (zh) * 2013-06-07 2018-04-27 国家电网公司 一种分散控制系统的扩展输入输出装置和方法
US11032219B2 (en) * 2015-12-22 2021-06-08 Intel Corporation Network aware application dependent adaptive protocol selection for IoT communications
CN111615078B (zh) * 2020-04-20 2023-02-24 深圳联友科技有限公司 一种c-v2x协议栈的通信方法及装置
CN112019638A (zh) * 2020-09-11 2020-12-01 苏州伯行科技有限公司 一种基于ros2的its协议栈

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210112384A1 (en) * 2016-11-28 2021-04-15 Lg Electronics Inc. Device and method for v2x communication
CN107347030A (zh) * 2017-06-29 2017-11-14 重庆邮电大学 一种基于v2x通信的消息管理装置及方法
US20200267518A1 (en) * 2017-11-27 2020-08-20 Intel IP Corporation Multi-access edge computing (mec) based multi-operator support for c-v2x systems
CN113055198A (zh) * 2019-12-26 2021-06-29 大唐高鸿数据网络技术股份有限公司 一种应用标识集合配置方法、设备、装置及介质
CN113938858A (zh) * 2021-12-17 2022-01-14 高新兴智联科技有限公司 一种v2x协议栈的通讯方法

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116599774A (zh) * 2023-07-17 2023-08-15 交通运输部公路科学研究所 一种用于车联网信息安全与数据防护的加密芯片
CN116599774B (zh) * 2023-07-17 2023-09-15 交通运输部公路科学研究所 一种用于车联网信息安全与数据防护的加密芯片
CN117729544A (zh) * 2024-02-04 2024-03-19 中国电子科技集团公司第三十研究所 移动通信n4接口安全防护装置和方法
CN117729544B (zh) * 2024-02-04 2024-04-30 中国电子科技集团公司第三十研究所 移动通信n4接口安全防护装置和方法

Also Published As

Publication number Publication date
CN113938858B (zh) 2022-04-12
CN113938858A (zh) 2022-01-14

Similar Documents

Publication Publication Date Title
WO2023108871A1 (zh) 一种v2x协议栈的通讯方法
WO2022002075A1 (zh) 基于边缘计算的物联代理装置及数据决策方法
CN112512024B (zh) 一种面向5g网络的物联网终端安全汇聚接入方法及系统
CN104639625A (zh) 一种基于mqtt的数据集中器采集控制方法、装置及系统
CN106464687A (zh) 经由用户隧道通信的客户端应用程序
CN108881820B (zh) 一种监控数据的获取方法和装置
US20060221882A1 (en) File distribution method and apparatus in a mobile broadcast system
CN109587142B (zh) 一种面向业务流的数据安全接入模块和设备
WO2016145981A1 (zh) 一种数据传输系统及方法
CN109769123A (zh) 一种视联网数据的处理方法及系统
WO2010127531A1 (zh) 基于web service的装置、web service组件及方法
KR20230113785A (ko) 네트워크 정보 공개 방법 및 장치, 전자 디바이스,및 저장 매체
JP2010510568A (ja) リソース伝送方法及び情報提供方法
CN113747375A (zh) 一种5g消息中的第三方应用用户敏感信息一键获取系统及方法
Zhao et al. Privacy‐preserving data aggregation scheme for edge computing supported vehicular ad hoc networks
CN102137394A (zh) 网络接入下加密移动通信终端系统及方法
CN109922089A (zh) 一种基于sdk包的协议转换方法及系统
CN112422300B (zh) 基于区块链的云网专线管理方法、upf及区块链平台
CN109347856A (zh) 一种视联网终端的登录方法和系统
WO2009039692A1 (fr) Procédé et système pour crypter une clé de flux de programme dans le service de diffusion multimédia mobile
CN104618878A (zh) 短信网关
CN108900518A (zh) 可信的软件定义云网络数据分发系统
CN101729381B (zh) 一种基于外部系统的数据动态定制与交换系统及方法
CN115442061A (zh) 安全认证方法、可读介质和电子设备
CN114501398A (zh) 一种基于蓝牙mesh使WIFI设备联网的控制系统及方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22905643

Country of ref document: EP

Kind code of ref document: A1